What are the considerations, if any, that the customer has to include into their plans for upgrading?
A z14 ZR1 is configured for Capacity Marker W06 and 6 IFLs. At the time of purchase, the customer had not expected growth. Therefore, the CPC was configured as a Max12 (FC#0637). However, additional Java workload makes the deployment of a zIIP engine feasible. What are the considerations, if any, that the customer has to […]
As it relates to Pervasive Encryption, which of the following statements most accurately counters this Intel-c
Intel marketing argues that their chip-based encryption is equivalent to IBM Z Systems capability. As it relates to Pervasive Encryption, which of the following statements most accurately counters this Intel-centric claim? A. Coupling IBM Pervasive Encryption with Intel encryption is sufficient as Intel exploitation requires no application changes B. Intel encryption requires application changes C. […]
Which of the following best describes the term “RPO”?
Which of the following best describes the term “RPO”? A. The point at which the data is in a consistent state at both the primary and the backup sites. B. The point at which the business declares a disaster. C. The point at which GDPS software begins automatic failover. D. The point at which the […]
How will the pricing be based through Resourcelink tables?
A customer has a new z14 and would like Container Pricing for the z/OS system based on their monthly usage. How will the pricing be based through Resourcelink tables? A. MIPS B. LSPR C. ITRR D. MSU Reference: https://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/8/897/ENUS118-018/index.html&request_locale=en
Which IBM Cloud offering relies on Secure Service Container (SSC) for its security?
Which IBM Cloud offering relies on Secure Service Container (SSC) for its security? A. IBM Cloud DevOps B. IBM Cloud Secure Virtualization C. IBM Cloud Provisioning and Management D. IBM Blockchain Platform
What system function should be recommended?
Due to recent data protection legislation, your client has asked how to protect the integrity of their z/OS audit records. What system function should be recommended? A. Pervasive Encryption B. zSecure Audit C. Crypto Express adapter D. Signed SMF data Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&ved=2ahUKEwjhlanup43mAhUvsaQKHf0KCcoQFjAIegQIBRAC&url=https%3A%2F%2Fwww.ibm.com%2Fdownloads%2Fcas%2FPLERXQDQ&usg=AOvVaw23CLCcjsZJ3CmdxQFan2Wr